When I first started my working life, I worked for an organisation where, if you called the IT helpdesk, the “help” consisted of two standard responses:
Read MoreGrant McGregor Blog
Posts about
IT issues
Computer Says: User Error
June 04, 2018
Pegasus CouriersJust wanted to say a big thank you to Dan for his help today. Above and beyond and very patient with a beginner like me.
- Read in full
Daniel Floyd, Pegasus Couriers
Categories
- Uncategorized (256)
- IT Security (201)
- IT Support (159)
- IT Service (145)
- Advisory Guide (92)
- Cyber Security (92)
- IT Consultancy (81)
- IT security (74)
- Managed IT Services (68)
- IT System Upgrade (66)
- IT Outsourcing (52)
- Microsoft (49)
- Cloud Services (45)
- Cyber Essentials (45)
- Grant McGregor (42)
- GDPR (38)
- security (37)
- IT support edinburgh (36)
- IT Equipment Supply (28)
- IT Project Delivery (28)
- technology (28)
- Grant McGregor Edinburgh (25)
- GFI Software (24)
- IT Audit (24)
- Network Management (23)
- Partner News (23)
- staff training (23)
- Cyber Essentials Plus (22)
- About Us (21)
- disaster recovery (21)
- Back Up (20)
- 2FA (19)
- Client (19)
- Cyber Attack (19)
- Data Leak Prevention (19)
- cybersecurity (18)
- data breach (18)
- two-factor authentication (18)
- Malware (17)
- Office 365 (17)
- password protection (17)
- ransomware (17)
- GFI Cloud (16)
- GFI LanGuard (16)
- phishing (16)
- social meda (16)
- social media (16)
- Edinburgh (15)
- Business (14)
- Cyber Essentials Certification (14)
- EndPoint Security (14)
- Grant McGregor IT (14)
- ICO (14)
- IT strategy (14)
- spear-phishing (14)
- Collaboration (13)
- Microsoft Office 365 (13)
- Windows 10 (13)
- BYOD (12)
- GFI WebMonitor (12)
- Microsoft Teams (12)
- SME (12)
- encryption (12)
- Cyber attacks (11)
- hackers (11)
- IT (10)
- NCSC (10)
- data security (10)
- mobile device management (10)
- phishing attack (10)
- productivity (10)
- updates (10)
- IT strategy guide (9)
- MFA (9)
- Windows 7 (9)
- multi factor authentication (9)
- remote working (9)
- Cyber Essentials Scheme (8)
- Information Commissioner's Office (8)
- Patch Management (8)
- The Cloud (8)
- backups (8)
- data (8)
- passwords (8)
- phishing attacks (8)
- CEO fraud (7)
- Cloud services (7)
- Email (7)
- GFI (7)
- GM Cyber Aware (7)
- IASME (7)
- IT Software and Solutions (7)
- IoT (7)
- Password Management (7)
- WhatsUp Gold (7)
- business continuity (7)
- cyber crime (7)
- cyber threats (7)
- cybercrime (7)
- data protection (7)
- personal data (7)
- security awareness training (7)
- working from home (7)
- Better IT Support Services (6)
- CE (6)
- Cloud (6)
- General Data Protection Regulation (6)
- IT provider (6)
- SharePoint (6)
- VPN (6)
- Virtualisation (6)
- backup (6)
- cyber security awareness training (6)
- software updates (6)
- spam (6)
- upgrade (6)
- Email Security (5)
- Email filtering (5)
- GFI EventsManager (5)
- IT Edinburgh (5)
- IT Management (5)
- IT Services (5)
- IT Support Advice (5)
- IT partner (5)
- Job Opportunities (5)
- MDM (5)
- O365 (5)
- Recovery Point Objective (5)
- SMEs (5)
- SaaS (5)
- Web Filtering (5)
- anti-virus (5)
- benefits (5)
- brexit (5)
- cyber security training (5)
- disaster recovery plan (5)
- internet of things (5)
- managed service provider (5)
- outsourcing (5)
- password security (5)
- patching (5)
- security measures (5)
- security risk (5)
- social engineering (5)
- viruses (5)
- Anti-Vitus Software (4)
- Apple (4)
- Application Performance Monitoring (4)
- BCDR (4)
- BCDR plan (4)
- Bring Your Own Device (4)
- Excel (4)
- GFI EndPoint Security (4)
- GFI VIPRE (4)
- Grant McGregor Ltd (4)
- IT Guide (4)
- IT security Edinburgh (4)
- IaaS (4)
- LinkedIn (4)
- MSP (4)
- Meet Your Team (4)
- Microsoft 365 (4)
- Network Monitoring (4)
- PowerPoint (4)
- RPO (4)
- RTO (4)
- SMB (4)
- WFH (4)
- access control (4)
- business continuity plan (4)
- compliance (4)
- cybersecurity training (4)
- data backup (4)
- human firewall (4)
- marketing (4)
- phishing scams (4)
- protect your data (4)
- recovery (4)
- secure data (4)
- security policy (4)
- security updates (4)
- software (4)
- strong passwords (4)
- AI (3)
- Active Discovery (3)
- Award (3)
- Axcient (3)
- Azure (3)
- Cloud storage (3)
- Cloudfinder (3)
- Cyber Essentials Certifying Body (3)
- EU (3)
- Email Management (3)
- Facebook (3)
- GFI Wireless Sentry (3)
- HR (3)
- ISO 27001 (3)
- IT Infrastructure (3)
- IT Solutions (3)
- IT estate (3)
- IT housekeeping (3)
- IT manager (3)
- IT project delivery (3)
- IT strategy development (3)
- IT support services (3)
- IT upgrade (3)
- IT vulnerabilities (3)
- Instagram (3)
- Laptop backup (3)
- LogicNow (3)
- Microsoft Intune (3)
- Microsoft Office (3)
- Microsoft Teams Guide (3)
- Network Security (3)
- OneDrive (3)
- Outlook (3)
- Outsourced IT (3)
- Password (3)
- RDS (3)
- Recovery Time Objective (3)
- Remote technology (3)
- Robotic process automation (3)
- Security Breach (3)
- Server Virtualisation (3)
- Small Businesses (3)
- Twitter (3)
- Windows 8 (3)
- Word (3)
- antivirus (3)
- apps (3)
- business owner (3)
- cloud backup free trial (3)
- cloud migration (3)
- co-sourcing (3)
- connectivity (3)
- covid-19 (3)
- customer data (3)
- customer service (3)
- cyber criminals (3)
- data breaches (3)
- data management (3)
- data recovery (3)
- employee training (3)
- five-step IT strategy guide (3)
- free IT guide (3)
- hardware (3)
- information asset register (3)
- mobile devices (3)
- patches (3)
- phishing emails (3)
- remote access (3)
- security patches (3)
- security software (3)
- software update (3)
- solutions (3)
- staff cyber security training (3)
- stolen laptop (3)
- storage (3)
- teamwork (3)
- testing (3)
- upgrades (3)
- 12 step cyber security checklist (2)
- 2-factor authentication (2)
- 24/7 monitoring (2)
- 3D printing (2)
- Award winning product (2)
- Axcient x360 Cloud (2)
- BYOD policy (2)
- Back-up Recovery (2)
- Carphone Warehouse (2)
- Centre (2)
- Cloud back-up (2)
- Competitive Advantage (2)
- Computer Security Awards (2)
- Cross-Site Scripting (2)
- Cyber Essentials Certificate (2)
- Cyber Essentials Edinburgh (2)
- Cyber Essentials security standard (2)
- Cyber Essentials vouchers (2)
- CyberEssentials (2)
- DUO (2)
- DUO solution (2)
- Data Protection Officer (2)
- Datto (2)
- Employee Monitoring (2)
- End Point Security (2)
- GDPR compliance (2)
- GFI Archiver (2)
- GFI Events Manager 2013 (2)
- Google (2)
- Government Security Standard (2)
- IASME accreditation (2)
- IP address locking (2)
- IT Services Guide (2)
- IT Software (2)
- IT Support Company (2)
- IT Support Partner (2)
- IT Systems Upgrade (2)
- IT activity (2)
- IT appraisal (2)
- IT expenditure (2)
- IT guide Grant McGregor (2)
- IT managers (2)
- IT network (2)
- IT plan (2)
- IT policies (2)
- IT predictions (2)
- IT process (2)
- IT refresh (2)
- IT refresh strategy (2)
- IT security concerns (2)
- IT security policy (2)
- IT strategies (2)
- IT support Scotland (2)
- Internet Explorer (2)
- Internet Explorer end of life (2)
- Internet connection (2)
- Ipswitch (2)
- LFI (2)
- Layered Security (2)
- Local File Inclusion (2)
- Lost Email (2)
- MAX MailProtection (2)
- Microsoft Azure (2)
- Microsoft SharePoint (2)
- Microsoft Windows 10 (2)
- Microsoft backup (2)
- Missing Email (2)
- National Cyber Security (2)
- National Cyber Security Centre (2)
- OWASP (2)
- Office 2010 (2)
- Office Move (2)
- OneNote (2)
- PaaS (2)
- QuickBooks (2)
- RFI (2)
- Remote Desktop Services (2)
- Remote File Inclusion (2)
- SQL injection (2)
- SQLi (2)
- SharePoint Online (2)
- UK businesses (2)
- Virtual Private Networks (2)
- WannaCry virus (2)
- Web Security (2)
- Windows (2)
- Windows 7 end of life (2)
- Windows 8.1 (2)
- Windows Server 2008 R2 end of life (2)
- XSS (2)
- Zero 2 Hero (2)
- adware (2)
- anti-spam (2)
- anti-virus protection (2)
- anti-virus software (2)
- antimalware (2)
- applications (2)
- are your web applications secure? secure websites (2)
- artificial intelligence (2)
- auditing (2)
- backup services (2)
- backup software (2)
- backup solutions (2)
- bad weather (2)
- bank statements (2)
- best practice password security (2)
- browsing online safely (2)
- brute-force protection (2)
- business data (2)
- business network (2)
- business protection (2)
- business security (2)
- business strategy (2)
- captcha code (2)
- choosing an IT partner (2)
- cloud backup (2)
- cloud technologies (2)
- collaboration tools (2)
- communication (2)
- complex password (2)
- confidential information (2)
- connections (2)
- contingency plan (2)
- control access (2)
- coronavirus (2)
- corporate owned devices (2)
- cost of poor IT support (2)
- costs (2)
- critical vulnerabilities (2)
- customer feedback (2)
- cyber essentials plus certification (2)
- cyber resilience (2)
- cyber security controls (2)
- cybercriminals (2)
- dark net (2)
- dark web (2)
- data handling practices (2)
- data hygiene (2)
- data integrity (2)
- data privacy (2)
- easy steps (2)
- education (2)
- effective IT strategy (2)
- email archiving (2)
- email scams (2)
- email security solution (2)
- employee absence (2)
- employees (2)
- employer brand (2)
- features (2)
- firewall (2)
- firewalls (2)
- flexibility (2)
- free Cyber Essentials guide (2)
- free IT strategy guide (2)
- free guide (2)
- guide (2)
- hacking (2)
- help guide (2)
- hidden costs (2)
- hiring staff (2)
- home working (2)
- iPad (2)
- insider threat (2)
- install security patches (2)
- least privilege (2)
- locally hosted software (2)
- lock devices (2)
- log out of accounts (2)
- malware attack (2)
- mobile security (2)
- mobile technology (2)
- monitoring user accounts (2)
- multifactor authentication (2)
- multiple verification (2)
- network (2)
- new WFH rules (2)
- organise (2)
- out of office (2)
- out-of-date software (2)
- parental controls (2)
- password lockout (2)
- password policy (2)
- phishing email (2)
- plan your handovers (2)
- planning (2)
- points of failure (2)
- prevent data breach (2)
- privacy settings (2)
- proactive approach to IT (2)
- project management (2)
- protect devices while on holiday (2)
- protect your devices (2)
- protect your organisation (2)
- protection (2)
- ransomware attack (2)
- ransomware protection (2)
- reactive IT (2)
- recruitment (2)
- reduce threats (2)
- reputable retailers (2)
- restore (2)
- return to operation (2)
- review user access rights (2)
- router (2)
- safeguard your childrens devices (2)
- secure passwords (2)
- secure payment pages (2)
- secure remote connectivity solutions (2)
- secure web applications (2)
- secure your IT (2)
- secure your devices (2)
- security assessment (2)
- security best practice (2)
- security policies (2)
- security procedures (2)
- security risks (2)
- security standards (2)
- security vulnerabilities (2)
- security while on holiday (2)
- shop safely (2)
- social attack vendors (2)
- social media phishing (2)
- software patches (2)
- software up to date (2)
- spam filters (2)
- spring clean (2)
- spyware (2)
- stolen phone (2)
- strategy development (2)
- stronger passwords (2)
- summer holidays (2)
- switch IT provider (2)
- switch to Microsoft Teams (2)
- technological change (2)
- technology solutions (2)
- templates (2)
- trusted partner (2)
- two-step verification (2)
- unsecured networks (2)
- update software (2)
- upgrade to Windows 10 (2)
- user account management (2)
- user account permissions (2)
- user accounts (2)
- user error (2)
- user management best practice (2)
- virtualisation (2)
- vulnerabilities (2)
- web app software (2)
- web application vulnerability (2)
- website (2)
- website security (2)
- windows 7 upgrade (2)
- windows vista (2)
- wireless (2)
- worms (2)
- zero trust (2)
- 2016 technology trends (1)
- 2019 (1)
- 2019 MSP 501 winners (1)
- 2019 tech trends (1)
- 24/7 Monitoring/ Educating employees (1)
- 25th May 2018 (1)
- 29th July 2015 (1)
- 2FA in workplace (1)
- 365 Availability (1)
- 5 step guide (1)
- 5G development (1)
- 6 secrets of IT support (1)
- 7-step plan (1)
- ALTO (1)
- AMD (1)
- AR (1)
- ARM (1)
- AWS Amazon Web Service (1)
- About (1)
- Accounts Systems (1)
- Activity API (1)
- Adobe Acrobat Reader DC (1)
- Alter 'mark as read' (1)
- Android (1)
- App Control (1)
- Archiver (1)
- Are you doing enough to protect your data? (1)
- Article 17 (1)
- Augmented Reality (1)
- Axcient x360Cloud (1)
- B2B (1)
- B2B marketing (1)
- BCDR solutions (1)
- BCDR test (1)
- BDR (1)
- Bad Romance (1)
- Baillie Signs (1)
- Basecamp (1)
- Best UK GFI Partner (1)
- BitDefender (1)
- BitDefender Gravity Zone (1)
- BitDefender features (1)
- Brexit deal (1)
- British businesses (1)
- Business Internet Usage (1)
- Business Premium (1)
- Business goals (1)
- Buy GFI LanGuard (1)
- CE Certifying Body (1)
- CE Trusted Partner (1)
- CE certificate (1)
- CE voucher deadline (1)
- CE vouchers for charities (1)
- CEO scam (1)
- CEOs (1)
- CIO (1)
- CMDB (1)
- CPU (1)
- CPU bugs (1)
- CRM (1)
- CRM online (1)
- CRM software (1)
- CRM system (1)
- CSAT (1)
- California Consumer Privacy Act (1)
- Calling Last Orders on Windows 7 (1)
- Cambridge Analytica scandal (1)
- Canyoning (1)
- Car livery (1)
- Carphone Warehouse data breach (1)
- Carphone Warehouse fine (1)
- Central Belt (1)
- Central Scotland (1)
- Change Configuration Management (1)
- Channel Futures MSP 501 rankings (1)
- Chief Information Officer (1)
- Christmas (1)
- Cloud adoption (1)
- Cloud service provider (1)
- CoAuthoring (1)
- Community Partner (1)
- Computer (1)
- Containers (1)
- ControlNow (1)
- CrySiS (1)
- CryptON (1)
- CryptoLocker (1)
- Crystal Ball (1)
- Customer Satisfaction (1)
- Cyber Essentials Scotland (1)
- Cyber Essentials Security Accreditation (1)
- Cyber Essentials event (1)
- Cyber Essentials event Edinburgh (1)
- Cyber Essentials for business (1)
- Cyber Essentials guide (1)
- Cyber Essentials information (1)
- Cyber Essentials standard (1)
- Cyber Essentials voucher (1)
- Cyber Essentials voucher scheme (1)
- Cyber Voucher (1)
- DDOS (1)
- DDoS attacks (1)
- DDos attachks (1)
- DDos protection (1)
- DLP (1)
- DPIA (1)
- DPO (1)
- Data Protection Act (1)
- Data Protection Act 1988 (1)
- Data Protection Act 2018 (1)
- Data Protection Impact Assessments (1)
- David Lawrence (1)
- Delve (1)
- Desktop (1)
- Directors (1)
- Dixons (1)
- Docker Support (1)
- Download GFI LanGuard (1)
- Dynamics (1)
- EMM (1)
- EU citizens data (1)
- EU legislation (1)
- EU standard (1)
- Edinburgh Evening News (1)
- Edinburgh IT company (1)
- Endpoint Manager (1)
- Enterprise Mobility Management (1)
- Enterprise Resource Planning (1)
- Eurofins (1)
- Eurofins ransomware (1)
- European Union (1)
- European Union legislation (1)
- Exchange 2010 (1)
- Exchange Online (1)
- External Hard Drives (1)
- Fife (1)
- Fifty Five and Five (1)
- Find My Device (1)
- Find my iPhone (1)
- Firefox (1)
- Fraud Prevention (1)
- Free Webinar (1)
- Freshbooks (1)
- GDPR aftermath (1)
- GDPR compliance Cyber Essentials (1)
- GDPR customer relationship (1)
- GDPR deadline (1)
- GDPR fines (1)
- GDPR privacy notice (1)
- GDPR standards (1)
- GDPR what's next (1)
- GDPR-compliant (1)
- GFI Events Manager (1)
- GFI LanGard (1)
- GFI LanGuard Review (1)
- GFI MAX (1)
- GFI MailEssentials (1)
- GFI Viper (1)
- GM MDM (1)
- General Data Protection Regulations (GDPR) (1)
- Glasgow (1)
- GoCo (1)
- Google Chrome (1)
- Government-backed Cyber Essentials (1)
- Grant McGrego (1)
- Grant McGregor Christmas opening times (1)
- Grant McGregor IT Strategy Guide (1)
- Grant McGregor team (1)
- Grant McGregor top MSP (1)
- Grovo (1)
- HDD (1)
- Happy New Year (1)
- Hootsuite (1)
- Host Gardian Service (1)
- Hosted Services (1)
- HubSpot (1)
- Human Rights Act (1)
- IAR (1)
- IASME Gold (1)
- IASME Governance (1)
- IASME Governance standard (1)
- IBC (1)
- ICI (1)
- IE10 (1)
- IE11 (1)
- ISMS (1)
- ISO/IEC 27018 (1)
- ISP (1)
- IT Jobs Scotland (1)
- IT SOPs (1)
- IT Security Standard (1)
- IT Security breaches (1)
- IT Services Company (1)
- IT Services company in Edinburgh (1)
- IT Suppor Provider (1)
- IT Support Job Edinburgh (1)
- IT Support Provider (1)
- IT Support Technician (1)
- IT Systems Audit (1)
- IT advisory guide (1)
- IT asset list (1)
- IT audit and appraisal (1)
- IT audits (1)
- IT change (1)
- IT cleanse (1)
- IT collaboration (1)
- IT companies Edinburgh (1)
- IT company (1)
- IT company Edinburgh (1)
- IT consultanc (1)
- IT education (1)
- IT equipment (1)
- IT equipment replacement (1)
- IT error (1)
- IT expertise (1)
- IT issues (1)
- IT lifecycle (1)
- IT maintenence (1)
- IT operations (1)
- IT outsource supplier (1)
- IT partnership (1)
- IT perimeter (1)
- IT planning (1)
- IT predictions for 2018 (1)
- IT productivity (1)
- IT professional (1)
- IT provider Edinburgh (1)
- IT provider warning signs (1)
- IT refresh policy (1)
- IT security awareness training (1)
- IT security risks (1)
- IT security services (1)
- IT security threat (1)
- IT security threats (1)
- IT service Edinburgh (1)
- IT service management (1)
- IT service provider (1)
- IT services partner (1)
- IT spend (1)
- IT spending (1)
- IT spring clean (1)
- IT staff (1)
- IT strategy for SMEs (1)
- IT strategy plan (1)
- IT supplier (1)
- IT support company edinburgh (1)
- IT support cost (1)
- IT support outsourcing edinburgh (1)
- IT support price (1)
- IT support service edinburgh (1)
- IT system (1)
- IT system audit (1)
- IT systems (1)
- IT systems update (1)
- IT team (1)
- IT training (1)
- IT trends (1)
- IT upgrades (1)
- IaaS Infrastructure as a Service (1)
- Identity and access management (1)
- Incident and Problem Management procedure (1)
- Increased Email Size (1)
- Information Commisioner's Office (1)
- Information Commissioner (1)
- Information Security Management (1)
- Information Security Management System (1)
- Information Security System Audit (1)
- Intel (1)
- Intelligent Business Continity (1)
- International Electrotechnical Commission's standa (1)
- Internet Bandwidth (1)
- Internet Explorer 10 (1)
- Internet Explorer 11 (1)
- Internet Service Provider (ISP) (1)
- Internet traffic (1)
- IoT security (1)
- Is it time you outsourced your IT? (1)
- It nightmares (1)
- January sales (1)
- John Aithie (1)
- KTwo (1)
- Kevin Mitnick (1)
- Keyboard shortcuts (1)
- KnowBe4 (1)
- LOGICcards (1)
- Laptop data (1)
- Lothian (1)
- Luminous Creative (1)
- MAX Backup & Disaster Recovery (1)
- MAX Mail (1)
- MAX Remote Management (1)
- MAX Risk Intelligence (1)
- MAX Service Desk (1)
- MDM software (1)
- MDM solution (1)
- MDM strategy (1)
- ML technologies (1)
- MOVEit (1)
- MOVEit Transfer (1)
- MSP Edinburgh (1)
- Magento security breach (1)
- Managed Antivirus (1)
- Managed IT Support (1)
- Managed Service Providers (1)
- Managed Web Protection (1)
- Meltdown (1)
- Mention (1)
- Microsoft Authorized Education Reseller (1)
- Microsoft Business (1)
- Microsoft Cloud Services Partner (1)
- Microsoft Defender (1)
- Microsoft Edge (1)
- Microsoft Graph (1)
- Microsoft Home (1)
- Microsoft Office 365 subscription model (1)
- Microsoft Project (1)
- Microsoft Publisher (1)
- Microsoft RDP (1)
- Microsoft Word (1)
- Microsoft operating system (1)
- Microsoft outlook (1)
- Microsoft partner (1)
- Microsoft products (1)
- Microsoft subscription (1)
- Microsoft subscription price (1)
- Microsoft suite (1)
- Microsoft technical support (1)
- Microsoft upgrades (1)
- Midlothian (1)
- Mimecast (1)
- Modular technology (1)
- Monitoring Software (1)
- Multi-party HD Video Conferencing (1)
- NCA (1)
- NCSC report (1)
- NHS cyber attack (1)
- Nae Limits (1)
- Nano Server (1)
- Nested Virtualisation (1)
- O365 price (1)
- O365 subscription (1)
- OS upgrades (1)
- Office (1)
- Office 365 advantages (1)
- Office 365 for home business and students (1)
- Office 365 packages (1)
- Office 365 vulnerabilities (1)
- Office applications (1)
- OneDrive for Business sync (1)
- Our Clients (1)
- PC (1)
- PC breakdown (1)
- PC cost (1)
- PC hardware (1)
- PC issues (1)
- PCs (1)
- PDF Reader (1)
- PECR (1)
- PIN number (1)
- Patching solutions (1)
- People Per Hour (1)
- Per-file Encryption (1)
- Pinterest (1)
- Planner (1)
- Power BI (1)
- Powershell (1)
- Privacy and Electronic Communications Regulations (1)
- Procuring (1)
- Proofpoint (1)
- Publisher (1)
- RAM (1)
- RDP (1)
- RDP attacks (1)
- RDP ports (1)
- RDP vulnerabilities (1)
- Red Snow Alert (1)
- Regulation of Investigatory Powers Act (1)
- Regulations (1)
- Remote Desktop Protocol (1)
- SBRC (1)
- SCVO (1)
- SIRIS (1)
- SMBs (1)
- SME predictions 2020 (1)
- SOP (1)
- SOPs (1)
- SSD (1)
- SSH encrypted (1)
- SSO (1)
- SUPEE-5344 (1)
- Safari (1)
- Sage (1)
- Sage Accounting 2015 (1)
- Salesforce (1)
- SamSa (1)
- Scotland (1)
- Scottish Business Resilience Centre (1)
- Scottish Council for Voluntary Organisations (1)
- Scottish Enterprise (1)
- Scottish Government (1)
- Security Solutions (1)
- Security and Information Governance (1)
- Security bug (1)
- Security threat (1)
- Server (1)
- Shadow IT (1)
- SharePoint Server (1)
- Six Secrets to Better IT guide (1)
- Skype for business (1)
- Slack (1)
- Snappa (1)
- Software Solutions (1)
- Software and IT Asset configuration management (1)
- Software as a Service (SaaS) (1)
- SolarWinds (1)
- Spectre (1)
- Staff News (1)
- Standard Operating Procedures (1)
- State of Email Security Report (1)
- Storage Spaces Direct (1)
- Stress Survey (1)
- Symantec Cloud (1)
- TakeControl (1)
- Team Building (1)
- Technical Account Manager (1)
- Telecommunications Regulations (1)
- The Freak (1)
- Threat Track (1)
- ThreatTrack (1)
- ThreatTrack Security (1)
- TimeCamp (1)
- To-Do bar (1)
- Travelex (1)
- Travelex data breach (1)
- Trojan horses (1)
- UK (1)
- UK General Data Protection Regulation (1)
- UK citizens data (1)
- UK law (1)
- UK technology market (1)
- URL defense (1)
- USB Drives (1)
- Unison (1)
- Upwork (1)
- VIPRE Business (1)
- VM recovery (1)
- VR video (1)
- Virtual Memory (1)
- Volume (1)
- WEEE Directive (1)
- WUG (1)
- Watermark (1)
- Web Browsers (1)
- Web Protection (1)
- WebInsights (1)
- WhatsUpGold (1)
- White water rafting (1)
- Why IT cannot be a reactive activity (1)
- Wi-Fi (1)
- Wi-Fi security (1)
- Windows 10 upgrade (1)
- Windows 7 operating system (1)
- Windows 7 replacement (1)
- Windows Autopilot (1)
- Windows SBS 2011 (1)
- Windows SBS Server 2003 (1)
- Windows Server 2003 (1)
- Windows Server 2008 R2 (1)
- Windows Server 2016 (1)
- Windows XP (1)
- Xero (1)
- Yammer (1)
- Youtube (1)
- Zenefits (1)
- access (1)
- access rights management (1)
- accidental deletion (1)
- accidental threat (1)
- active directory (1)
- activities (1)
- address risks (1)
- advanced machine learning (1)
- advanced threat protection (1)
- advancing your IT strategy (1)
- advantages of BYOD (1)
- advice (1)
- agricultural drones (1)
- ambient environments (1)
- analytics (1)
- announcement (1)
- anti-malware (1)
- antivirus software (1)
- antivirus solution (1)
- app store (1)
- application audit (1)
- application recovery (1)
- application software (1)
- application sourcing (1)
- appraisal audit (1)
- archive (1)
- assess IT (1)
- assess risk (1)
- assess risks (1)
- asset and inventory tracking (1)
- asset register (1)
- attack surface (1)
- attacks (1)
- attracting talent (1)
- audit (1)
- auditing systems (1)
- audits (1)
- authentication (1)
- auto-fills (1)
- automate (1)
- automated monitoring (1)
- automatic updates (1)
- automation (1)
- autonomous vehicles (1)
- avoid phishing scams (1)
- back to school (1)
- back up solutions (1)
- back-up regime (1)
- backup for SMEs (1)
- backup process (1)
- backup system (1)
- backup testing (1)
- bad passwords (1)
- bandwidth (1)
- beginner's guide to encryption (1)
- best patching practice (1)
- best practices (1)
- better job (1)
- better the devil (1)
- better value IT (1)
- big organisation (1)
- biometrics (1)
- bitcoin (1)
- black friday (1)
- blockchain (1)
- blog post (1)
- boost performance (1)
- boost productivity (1)
- boost your IT performance (1)
- brand awareness (1)
- brand profile (1)
- brand reputation (1)
- breaches (1)
- brute force (1)
- burstable services (1)
- business IT support (1)
- business challenges (1)
- business continuity plans (1)
- business continuity solutions (1)
- business improvements (1)
- business management (1)
- business mobile device (1)
- business operations (1)
- business plan (1)
- business process automation tools (1)
- business safety (1)
- business solutions (1)
- business to business marketing (1)
- business users (1)
- business vulnerabilities (1)
- businesses (1)
- cabling (1)
- calculator (1)
- campaign (1)
- can we live without passwords (1)
- centralised data (1)
- certification (1)
- certifying body (1)
- change (1)
- change IT provider (1)
- change layout (1)
- channel moderation (1)
- charts (1)
- chatbots (1)
- check backups (1)
- chips (1)
- chipsets (1)
- christmas shopping (1)
- client data (1)
- close outlook properly (1)
- cloud computing (1)
- cloud computing solutions (1)
- cloud data storage (1)
- cloud provider (1)
- cloud security (1)
- cloud service (1)
- cloud solutions (1)
- cloud technology (1)
- cloud-based collaboration tools (1)
- cloud-based server (1)
- cloud-based software (1)
- clutter (1)
- co-sourcing benefits (1)
- collaboration tool (1)
- collaboration tools & technologies (1)
- colour code (1)
- communications (1)
- company data (1)
- company devices (1)
- company mobile devices (1)
- company security (1)
- company systems (1)
- company values (1)
- competitive strategy (1)
- compromised password (1)
- computer hardware (1)
- computer protection (1)
- computer weekly (1)
- conference calling (1)
- confidential (1)
- confidential waste bins (1)
- consent for marketing (1)
- conserves space (1)
- consumer rights (1)
- content marketing (1)
- continuity (1)
- continuum (1)
- coronavirus phishing scam (1)
- coronavirus-related cybercrime (1)
- corporate data leakage (1)
- cost (1)
- cost management service levels (1)
- cost of data breach (1)
- cost saving (1)
- cracking (1)
- create 'Favourites (1)
- creating IT strategy (1)
- creating an Information Asset Register (1)
- criminal risk (1)
- critical data (1)
- crute force attack (1)
- customer experience (1)
- cyber attack risk (1)
- cyber attackers (1)
- cyber awareness (1)
- cyber defences (1)
- cyber insurance (1)
- cyber security Edinburgh (1)
- cyber security breach (1)
- cyber security certificate (1)
- cyber security defences (1)
- cyber security education (1)
- cyber security experts (1)
- cyber security help (1)
- cyber security plan (1)
- cyber security practice (1)
- cyber security practices (1)
- cyber security risk (1)
- cyber security solutions (1)
- cyber security threat (1)
- cyber threat (1)
- cyber vulnerability (1)
- cyber-sercurity (1)
- cybersecurity awareness training (1)
- cybersecurity awareness training & testing for (1)
- cybersecurity training and testing (1)
- cybersquatting (1)
- dark web risk (1)
- darknet (1)
- darkweb (1)
- data analytics (1)
- data audit (1)
- data back up (1)
- data disaster (1)
- data governance (1)
- data leaks (1)
- data loss (1)
- data loss prevention software (1)
- data loss risk (1)
- data management policies (1)
- data privacy challenges (1)
- data privacy documentation (1)
- data privacy processes (1)
- data processes (1)
- data processing (1)
- data protection legislation (1)
- data protection policies (1)
- data residency (1)
- data retention policies (1)
- data security strategy (1)
- data sharing (1)
- data theft (1)
- data transfers (1)
- databases (1)
- datacentre (1)
- deep web (1)
- defence against hackers (1)
- delays (1)
- demands (1)
- design (1)
- desktop publishing (1)
- detox your digital (1)
- devices (1)
- difference between disaster recovery and business (1)
- digital alternatives (1)
- digital detox (1)
- digital document storage solution (1)
- digital processing (1)
- digital safety (1)
- digital security (1)
- digital skills (1)
- digital technology (1)
- digital transformation (1)
- digital workplace (1)
- direct marketing (1)
- disability campaign (1)
- disable add-ins (1)
- disaster (1)
- disaster recovery plans (1)
- disaster recovery process (1)
- disgruntled ex-employee (1)
- disruptive technologies (1)
- disruptive technology (1)
- document management (1)
- document storage (1)
- domain names (1)
- dotmailer (1)
- double up on your security (1)
- download IT strategy guide (1)
- downloads (1)
- downtime (1)
- driverless cars (1)
- drone technology (1)
- drones (1)
- eDiscovery (1)
- edinburgh IT support (1)
- edinburgh IT support company (1)
- educate employees (1)
- educate staff (1)
- educate users (1)
- education on cybersecurity (1)
- effective backup process (1)
- effective use (1)
- email compliance (1)
- email filtering service (1)
- email marketing (1)
- email phishing (1)
- email retention (1)
- email scanning tools (1)
- email search (1)
- email security solutions (1)
- email threat (1)
- email viruses (1)
- embracing disruptive technology (1)
- employee development (1)
- employee devices (1)
- employee dismissal (1)
- employee leaving (1)
- employee support (1)
- employee termination (1)
- encrypt (1)
- encrypt data at rest (1)
- encrypt data in transit (1)
- encrypted login support (1)
- encrypting data (1)
- encryption policy (1)
- end of life support (1)
- end of summer (1)
- end of support (1)
- end of support for Windows 7 (1)
- end points (1)
- endpoint (1)
- environmental monitoring data (1)
- envy (1)
- erasure requests (1)
- eu referndum (1)
- experienced (1)
- experiences (1)
- explots (1)
- extended security updates (1)
- external IT (1)
- external IT support (1)
- external suppliers (1)
- false email addresses (1)
- festive season (1)
- festive spirit (1)
- festivities (1)
- file recovery (1)
- file transfer (1)
- filter web traffic (1)
- finance (1)
- fingerprints (1)
- first line of defence (1)
- five step guide (1)
- flexible working (1)
- flexible working practices (1)
- free event (1)
- free event Edinburgh (1)
- free upgrade (1)
- full disk encryption (1)
- functionalities (1)
- gaming computer (1)
- gartner (1)
- get the best from staff (1)
- gluttony (1)
- gmail (1)
- good passwords (1)
- grants for Cyber Essentials (1)
- graphics and video cards (1)
- greed (1)
- grow your business (1)
- guide to cloud security (1)
- hacked (1)
- halloween (1)
- handling confidential information (1)
- handling customer data (1)
- hardware asset list (1)
- hardware audit (1)
- hardware failure (1)
- hardware replacement (1)
- hardware updates (1)
- hashtags (1)
- health (1)
- help with remote working (1)
- helpdesk (1)
- high risk employees (1)
- hiring (1)
- holes (1)
- home network (1)
- home networks (1)
- home office (1)
- home users (1)
- home worker (1)
- home workers (1)
- homeworking (1)
- hotmail (1)
- how do I upgrade Windows 7 (1)
- how do you stop a phishing attack (1)
- how much does IT support cost (1)
- how to spot suspicious emails (1)
- how to stay safe when browsing online (1)
- humanity (1)
- hybrid backup solution (1)
- hybrid cloud (1)
- hyperconnected (1)
- iMac (1)
- iOS 8 (1)
- iOS devices (1)
- iPad Pro (1)
- iPhone (1)
- identify critical vulnerabilities and points of fa (1)
- identify weak spots (1)
- illnesses (1)
- images (1)
- implement new IT system (1)
- implementation testing (1)
- implementing (1)
- implementing change (1)
- importance of updates (1)
- improve efficiency (1)
- improve processes (1)
- improve productivity (1)
- improvement (1)
- improving office connectivity (1)
- in-house (1)
- in-house training (1)
- inbound marketing (1)
- increase efficiency (1)
- industry expert (1)
- information management practice (1)
- information management strategy (1)
- information security (1)
- infrastructure as a service (1)
- innovation (1)
- insecure data (1)
- insecure wireless networks (1)
- insider attacks (1)
- internal IT (1)
- internal IT advantages (1)
- internal and external IT work together (1)
- internet (1)
- internet explorer 10 upgrade (1)
- introduction to Cyber Essentials (1)
- invest in people (1)
- invest in training (1)
- junk email (1)
- key controls (1)
- key logging (1)
- knowledge (1)
- laptop breakdown (1)
- laptop hardware (1)
- large business (1)
- legacy apps (1)
- legal risks (1)
- legislation (1)
- legitimate interest (1)
- letting an employee go (1)
- life without passwords (1)
- lifecycle of IT assets (1)
- limit user access (1)
- links (1)
- lockable document storage cabinets (1)
- long term technology challenges (1)
- lost mobile device (1)
- lost smartphone (1)
- lust (1)
- mail filtering (1)
- maintenance (1)
- maintenance procedure (1)
- malicious attack (1)
- malicious hackers (1)
- malicious threat (1)
- malware protection (1)
- malware security (1)
- managed archiving (1)
- managed threat prevention (1)
- managing critical business data (1)
- managing data (1)
- managing security (1)
- managing virtual work team (1)
- marketing calls (1)
- math (1)
- measures and controls (1)
- merry Christmas (1)
- merry Christmas from Grant McGregor (1)
- micro businesses (1)
- micro-perimiters (1)
- mobile device (1)
- mobile device security (1)
- mobile device security solution (1)
- mobile devises (1)
- mobile friendly (1)
- mobile malware (1)
- mobile responsive website (1)
- mobile search (1)
- mobile technologies (1)
- mobile workforce (1)
- mobilisation (1)
- mobility (1)
- modern working practices (1)
- monitoring rools (1)
- monitoring tools (1)
- move to Windows 10 (1)
- multi factor authentification (1)
- negligent threat (1)
- network equipment (1)
- network scanner (1)
- new IT provider (1)
- new Microsoft subscription model (1)
- new business continuity approach (1)
- new cyber security threat (1)
- new employee (1)
- new features (1)
- new normal (1)
- new rules for passwords (1)
- new season (1)
- new security threats (1)
- new solutions (1)
- new strategies (1)
- new technologies (1)
- new term (1)
- new version (1)
- new year (1)
- office connectivity (1)
- office wifi (1)
- on-device encryption (1)
- on-premise backup (1)
- on-premise server (1)
- one year since GDPR (1)
- online backup (1)
- online fraud (1)
- online scam (1)
- online security (1)
- online security threat (1)
- online share (1)
- online shopping (1)
- online tools (1)
- online training (1)
- operating procedures (1)
- operating systems (1)
- operational processes (1)
- optimise costs (1)
- organisation measures (1)
- organisational data (1)
- out-of-date hardware (1)
- outage (1)
- outsider attacks (1)
- outsource (1)
- outsource IT support (1)
- outsourced IT advantages (1)
- outsourced IT company (1)
- outsourced IT partner (1)
- overcharging (1)
- oversharing online (1)
- paperless (1)
- password blacklist (1)
- password generation tool (1)
- password manager (1)
- password policies (1)
- password practice (1)
- password spraying (1)
- password theft (1)
- password vault (1)
- patch vulnerabilities (1)
- permissions (1)
- personal attack (1)
- personal devices for work (1)
- phishers (1)
- phishing red flags (1)
- phishing scam (1)
- phishing simulator (1)
- phishing training (1)
- phone line (1)
- physical and network recovery (1)
- pitfalls of BYOD (1)
- plan (1)
- planning and processes (1)
- platform as a service (1)
- platforms (1)
- policies & procedures (1)
- policy (1)
- poor IT service (1)
- poor service (1)
- post-breach procedures (1)
- potential risk (1)
- practical measures (1)
- practical steps (1)
- predictions 2020 (1)
- prepare (1)
- prevent cyber attack (1)
- prevent cyber attacks (1)
- prevent insider attacks (1)
- prevent malicious sites (1)
- prevent ransomware attacks (1)
- price (1)
- price increase (1)
- pride (1)
- principle of least privilege (1)
- prioritise (1)
- prioritise IT spend (1)
- privacy (1)
- private cloud (1)
- procedure (1)
- procedures (1)
- process (1)
- processing data (1)
- processing personal data (1)
- processor modules (1)
- processor speed (1)
- productivity applications (1)
- productivity apps (1)
- productivity apps for small businesses (1)
- professional IT team (1)
- project team (1)
- proof of consent (1)
- pros and cons (1)
- protect against email attack (1)
- protect against phishing (1)
- protect data (1)
- protect devices (1)
- protect information assets (1)
- protect resources (1)
- protect your brand (1)
- protect your business (1)
- protect your business from cyber crime (1)
- protect your company (1)
- protect your device (1)
- protection suite (1)
- protocols (1)
- public cloud (1)
- questions for IT providers (1)
- randomware (1)
- ransom fee (1)
- ransomware prevention (1)
- re-posting articles (1)
- rebrand (1)
- reciprocation (1)
- recover from cyber attack (1)
- recruitment tools (1)
- recrutiment (1)
- recycle IT equipment (1)
- red flags (1)
- reduce attack surface (1)
- reduce bandwidth (1)
- reduce costs (1)
- refresher training (1)
- registering for automatic upgrade (1)
- regulatory obligations (1)
- regulatory requirements (1)
- relevant IT (1)
- reliable (1)
- remote device location (1)
- remote team meetings (1)
- remote team members (1)
- remote wipe (1)
- remote wiping clause (1)
- remote working strategies (1)
- replace IT (1)
- replace your IT equipment (1)
- replacement equipment strategy (1)
- requirements (1)
- restoring (1)
- retention (1)
- review security policies (1)
- revoking systems access (1)
- right to be forgotten (1)
- right to erasure (1)
- rights and control (1)
- risk analysis (1)
- risks (1)
- safe online browsing (1)
- sales (1)
- save time (1)
- scalability (1)
- scam (1)
- scam email (1)
- scammers (1)
- secure (1)
- secure devices (1)
- secure file transfer (1)
- secure firewalls (1)
- secure login (1)
- secure mobile devices (1)
- secure mobiles (1)
- secure my business (1)
- secure remote access (1)
- secure remote access technology (1)
- security advice (1)
- security and compliance (1)
- security audit (1)
- security certification (1)
- security checklist (1)
- security compromise (1)
- security consultant (1)
- security consultants (1)
- security controls (1)
- security cordon (1)
- security essentials awareness (1)
- security practice (1)
- security procedure (1)
- security processes (1)
- security solution (1)
- security specialists (1)
- security standard process (1)
- security strategy (1)
- security system (1)
- security threats (1)
- security threats 2020 (1)
- security tips (1)
- security tools (1)
- security training (1)
- security training cybersecurity training (1)
- sensitive data (1)
- shake up process (1)
- sharing personal data (1)
- shop safe online (1)
- short-term response plan (1)
- shredders (1)
- signals (1)
- six secrets guide (1)
- skills training (1)
- sloth (1)
- slow (1)
- small business (1)
- small organisation (1)
- smart cities (1)
- smart city (1)
- smart devices (1)
- social engineering risks (1)
- social media for SMEs (1)
- social media policy (1)
- social media presence (1)
- social media recruitment (1)
- social media security (1)
- social media security weak spot (1)
- social media targeting (1)
- social media tips (1)
- social media trends (1)
- social media vulnerabilities (1)
- social network (1)
- social phishing (1)
- social presence (1)
- social selling (1)
- software as a service (1)
- software asset list (1)
- software asset register (1)
- software upgrade (1)
- software vulnrabilities (1)
- spam filter (1)
- spoof attacks (1)
- spot a phishing attack (1)
- spot phishing attacks (1)
- spreadsheets (1)
- staff awareness (1)
- staff coaching (1)
- staff education (1)
- staff induction (1)
- staff skills training (1)
- standardise your procedures (1)
- staying safe online (1)
- stolen device (1)
- stolen mobile (1)
- stop phishing (1)
- stop ransomware (1)
- strategic training (1)
- strategies for surviving a cyber attack (1)
- strategy (1)
- strategy plan (1)
- subject matter experts (1)
- supply chain attacks (1)
- support (1)
- support calls (1)
- supporting work life balance through technology (1)
- suspect links (1)
- suspicious email (1)
- switch to Office 365 (1)
- switch your IT support provider (1)
- system restore (1)
- systems (1)
- systems audit (1)
- systems security (1)
- tackle employment barriers (1)
- targeted advertising (1)
- targeted phishing attack (1)
- technical measures (1)
- technical support (1)
- technology for homeworkers (1)
- technology investment (1)
- technology issues (1)
- technology predictions (1)
- technology prices (1)
- technology review (1)
- technology roadmap (1)
- technology security policy (1)
- technology spending (1)
- technology spring clean (1)
- technology strategy (1)
- technology trends (1)
- technology trends 2019 (1)
- technology update (1)
- test BCDR plan (1)
- testers (1)
- the EU (1)
- the GDPR (1)
- the dangers of over-sharing online (1)
- the importance of online backup (1)
- the right to be forgotten (1)
- third parties (1)
- third party data (1)
- third party risk (1)
- third-party (1)
- top 10 technology trends (1)
- top 10 tips (1)
- top 250 (1)
- top 501 Managed Service Providers worldwide (1)
- top tips for IT (1)
- training session (1)
- training strategies (1)
- trending (1)
- trends (1)
- trick or treat (1)
- trojans (1)
- typo squatting (1)
- typosquatting (1)
- under skilled staff (1)
- unified approach (1)
- unlimited (1)
- unreliable (1)
- unsubscribe (1)
- up to date data and apps (1)
- update (1)
- update PC (1)
- update plans (1)
- updated software (1)
- updating (1)
- upgrade IT (1)
- upgrade PC (1)
- upgrade advice (1)
- upgrade browsers (1)
- upgrade hardware (1)
- upgrade software (1)
- upgrade technology (1)
- user issues (1)
- user-removable hardware (1)
- using technology for recruitment (1)
- value for money (1)
- verification (1)
- vetting (1)
- via websites (1)
- video calling (1)
- video conferencing (1)
- video marketing (1)
- videos (1)
- viral (1)
- virtual WAN (1)
- virtual assistants (1)
- virtual conferences (1)
- virtual meeting place (1)
- virtual office (1)
- virtual work team (1)
- virus scan (1)
- vishing (1)
- vital information (1)
- weak passwords (1)
- wearable devices (1)
- web filtering solutions (1)
- welikeit (1)
- whaling (1)
- what PC to buy (1)
- what computer hardware to buy (1)
- what data should I encrypt (1)
- what have we learnt since GDPR (1)
- what is RDP (1)
- what not to do when you lose your mobile device (1)
- what to do if you have lost your mobile phone (1)
- what to do when you lose your mobile device (1)
- where is my email (1)
- why SMEs should get expert help with cyber securit (1)
- why email filtering is more important than ever (1)
- why should I encrypt data (1)
- wifi connection (1)
- wifi encryption (1)
- windows 10 migration (1)
- windows server 2008 upgrade (1)
- winter (1)
- wired (1)
- withdrawal of support (1)
- work flexibility (1)
- work life balance (1)
- working remotely (1)
- wrath (1)
- zero day exploits (1)
- zero inbox (1)
- zero trust model (1)